Author of the publication

Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste.

, , , , and . Sicherheit, volume P-228 of LNI, page 271-282. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time to Rethink: Trust Brokerage Using Trusted Execution Environments., , , , , and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 181-190. Springer, (2015)Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication., , , , , and . ACSAC, page 42-55. ACM, (2022)TrustEV: trustworthy electric vehicle charging and billing., , , and . SAC, page 1706-1715. ACM, (2020)HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure., , , , and . CSCS, page 12:1-12:10. ACM, (2020)Security and Trust in Safety Critical Infrastructures.. Technical University of Darmstadt, Germany, (2022)Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste., , , , and . Sicherheit, volume P-228 of LNI, page 271-282. GI, (2014)Implementing a Security Architecture for Safety-Critical Railway Infrastructure., , , , , , , and . SEED, page 215-226. IEEE, (2021)Securing Electric Vehicle Charging Systems Through Component Binding., , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 387-401. Springer, (2020)HIP: HSM-based identities for plug-and-charge., , , and . ARES, page 33:1-33:6. ACM, (2020)Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging., , and . ARES, page 2:1-2:10. ACM, (2019)